From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Game-Based Combinatorial Double Auction Model for Cloud Resource Allocation., , , , и . ICCCN, стр. 1-8. IEEE, (2019)Platoon-Based Resource Allocation in NOMA-Integrated V2X Networks., и . ICCT, стр. 821-826. IEEE, (2023)Unsupervised Graph-Sequence Anomaly Detection for 5G Core Network Control Plane Traffic., , , , , , , и . ICPADS, стр. 1645-1652. IEEE, (2023)Two-Sided Online Task Assignment Based on Worker Portraits in Mobile CrowdSensing., , , , , и . CSCWD, стр. 748-753. IEEE, (2024)Two-sided Online Stable Task Assignment with Incomplete Lists and Ties in Spatial Crowdsourcing., , , , , и . SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta, стр. 1754-1759. IEEE, (2022)On Privacy-Preserving Task Assignment for Heterogeneous Users in Mobile Crowdsensing., , , , , и . CSCWD, стр. 837-842. IEEE, (2023)Quality-Oriented Task Assignment for Heterogeneous Users in Mobile Crowdsensing., , , , , и . CSCWD, стр. 1421-1426. IEEE, (2023)Minimal road-side unit placement for delay-bounded applications in bus Ad-hoc networks., , , и . IPCCC, стр. 1-7. IEEE Computer Society, (2017)Masked Transformer-based Multi-GAN for 5G Core Network KPI Anomaly Detection., , , , , , , и . CSCWD, стр. 2601-2606. IEEE, (2024)Network Traffic Intrusion Detection Strategy Based on E-GraphSAGE and LSTM., , , , , , и . ICIC (9), том 14870 из Lecture Notes in Computer Science, стр. 25-37. Springer, (2024)